Cyber Security Budgets Are Misspent

A leading cyber security services company, Integrity360, has announced its findings from a Twitter poll to gain visibility into cyber security budgets and over surplus solutions within businesses. Their conclusion is that almost 30% of polled businesses have between 31-40 tools that are not required in their tech stack  

The poll, which was conducted between 8-10 March, found that over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.  

In addition, almost 30% of those surveyed agree that they have more than 31-40 tools and solutions within their tech stack that could be removed due to overlapping and unused features. This is a worrying figure when cyber security breaches continue to rise, and businesses are left with gaps that could give cyber attackers a route in. 

The CTO of Integrity360, Richard Ford, commented: “Whilst businesses recognise the need to allocate more budget towards cyber security, the difficulty lies in knowing where to apportion the spend...  It’s easy to throw money at all the shiny new tech and solutions on the market, but this results in disparate systems, with too many tools deployed for specific purposes, that ultimately go unmanaged and underutilised.” 

Furthermore, 46% of polled respondents believe the most damaging impact of a cyber security breach to be the consequential financial damage.

“Businesses need a cyber security strategy that provides full visibility over their tech stack and the solutions they have, those they need and those they can do without... An overabundance of solutions with features that overlap or aren’t required, is an accident waiting to happen, and a drain on budget and efficiency”, Ford commented. 

At a time of economic downturn when cyber security budgets are tight and risks are heightened, spending money on unnecessary and unused solutions is a business risk. Action to get rid of outdated systems, to consolidate different platforms and convergence of technologies us the best way optimise spending as well as improving overall security posture, according to Ford. 

 

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« World Backup Day 
Bitbucket Backup Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

UL Solutions

UL Solutions

UL Solutions is a safety, security and compliance consulting and certification company. Areas covered include cyber security.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

MazeBolt Technologies

MazeBolt Technologies

Israel-based MazeBolt is an innovation leader in cybersecurity, with over two decades of experience in pioneering DDoS protection solutions.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

ELK Analytics

ELK Analytics

ELK Analytics is a specialized Managed Security Services Provider (MSSP) that focuses on endpoint security and monitoring & alerting for any type of structured or unstructured data.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.

Net Essence

Net Essence

Net Essence is a Managed IT Services Provider. We deliver effective, reliable and fit-for-purpose IT solutions for SMEs based in the UK.

CyberMindr

CyberMindr

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats.